'N Bestuurshulpmiddel vir die evaluering van'n maatskappy se rekenaarsekerheidsgraad R Von Solms PQDT-Global, 1989 | | 1989 |
A business approach to effective information technology risk analysis and management S Halliday, K Badenhorst, R Von Solms Information management & computer security 4 (1), 19-31, 1996 | 151 | 1996 |
A conceptual framework for cyber-security awareness and education in SA N Kortjan, R Von Solms South African Computer Journal 52 (1), 29-41, 2014 | 116 | 2014 |
A cybersecurity curriculum M De Lange, R Von Solms Southern African Cyber Security Awareness Workshop 2011, 2011 | 1 | 2011 |
A cyclic approach to business continuity planning J Botha, R Von Solms Information Management & Computer Security 12 (4), 328-337, 2004 | 182 | 2004 |
A Feasibility Study Towards E-processing Supply Chain Management Transactions in South African Municipalities S Koekemoer, R Von Solms Proceedings of Sixth International Congress on Information and Communication …, 2022 | | 2022 |
A formalized approach to the effective selection and evaluation of information security controls L Barnard, R Von Solms Computers & Security 19 (2), 185-194, 2000 | 98 | 2000 |
A framework for assuring the conformance of cloud-based email M Willett, R Von Solms 8th International Conference for Internet Technology and Secured …, 2013 | 2 | 2013 |
A framework for information security evaluation R von Solms, H Van Der Haar, SH von Solms, WJ Caelli Information & Management 26 (3), 143-153, 1994 | 89 | 1994 |
A framework for the governance of information security S Posthumus, R Von Solms Computers & security 23 (8), 638-646, 2004 | 414 | 2004 |
A framework towards governing “Bring Your Own Device in SMMEs” N Fani, R von Solms, M Gerber 2016 Information Security for South Africa (ISSA), 1-8, 2016 | 17 | 2016 |
A general morphological analysis: delineating a cyber-security culture N Gcaza, R Von Solms, MM Grobler, JJ Van Vuuren Information & Computer Security 25 (3), 259-278, 2017 | 42 | 2017 |
A holistic framework for the fostering of an information security sub-culture in organizations. J Van Niekerk, R Von Solms Issa 1 (13), 2005 | 94 | 2005 |
A Methodology for Establishing an Information Security Governance Environment SH Solms, R Solms, SH von Solms, R von Solms Information Security Governance, 1-4, 2009 | | 2009 |
A model for deriving information security control attribute profiles H Van der Haar, R Von Solms Computers & Security 22 (3), 233-244, 2003 | 33 | 2003 |
A model for information security governance in developing countries J Coertze, R von Solms e-Infrastructure and e-Services for Developing Countries: 4th International …, 2013 | 26 | 2013 |
A model for information security management R Von Solms, SH Von Solms, WJ Caelli Information Management & Computer Security 1 (3), 12-17, 1993 | 11 | 1993 |
A practical approach to information security awareness in the organization C Vroom, R von Solms Security in the Information Society: Visions and Perspectives, 19-37, 2002 | 29 | 2002 |
A responsibility framework for information security S Posthumus, R von Solms Security Management, Integrity, and Internal Control in Information Systems …, 2005 | 24 | 2005 |
A Risk-Based Approach to Formalise Information Security Requirements for Software Development L Futcher, R Von Solms Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013 | 3 | 2013 |